IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also hig...

Full description

Saved in:
Bibliographic Details
Published in:International journal of advanced research in computer science Vol. 16; no. 4; pp. 57 - 62
Main Author: Mustafa, Nada Abdul Aziz
Format: Journal Article
Language:English
Published: Udaipur International Journal of Advanced Research in Computer Science 20.08.2025
Subjects:
ISSN:0976-5697, 0976-5697
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract : The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX.
AbstractList : The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX.
The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX.
Author Mustafa, Nada Abdul Aziz
Author_xml – sequence: 1
  givenname: Nada Abdul Aziz
  surname: Mustafa
  fullname: Mustafa, Nada Abdul Aziz
BookMark eNpNkE1PwjAYxxujiYh8AU9NvDrs2q3rjnUbdMleCBQTTk032wSiDDsx8ds7wIPP5XkO_5c8vztwve_2BoAHH00xDRh53u60a_vpt0-3wTQiKLwCIxRH1AtpHF3_u2_BpO93aBgSxzRAI6DzcrGsXzOYcslhViXLzULmdQVfNnC9yqs5TPPZLM88kRVFySvIqxSmFYe8mNfLXIpy9QT5WoqsknnCZZaenKLkiSf4SuCQ3oMbq997M_nbY7CeZTIRXlHPB0fhtb4fhp4lrNGBbiLLLCYUadtqigIaEksoM5Qx_w01jGFkkWYtNrbRBkXUmqZp46ghY_B4yT247vNo-i-1645uP1QqggOfDE_jYFDhi6p1Xd87Y9XBbT-0-1E-Umea6kJTnWmqE03yC8bJYwA
ContentType Journal Article
Copyright 2025. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2025. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
CorporateAuthor Information Technology section University of Baghdad, Collage of Languages Baghdad, Iraq
CorporateAuthor_xml – name: Information Technology section University of Baghdad, Collage of Languages Baghdad, Iraq
DBID AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.26483/ijarcs.v16i4.7305
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central Database Suite (ProQuest)
ProQuest Technology Collection
ProQuest One
ProQuest Central
ProQuest Central Student
SciTech Collection (ProQuest)
ProQuest Computer Science Collection
Computer Science Database (ProQuest)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 0976-5697
EndPage 62
ExternalDocumentID 10_26483_ijarcs_v16i4_7305
GroupedDBID .4S
.DC
8FE
8FG
AAYXX
ABUWG
AFFHD
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
EOJEC
GNUQQ
HCIFZ
K6V
K7-
MK~
ML~
OBODZ
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
QM1
QO4
TUS
3V.
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
PUEGO
Q9U
ID FETCH-LOGICAL-c1155-f38ba4ab7f8f2360afca604653f368e6881d0b8820f0a8c2efbae076febbc97b3
IEDL.DBID P5Z
ISSN 0976-5697
IngestDate Sat Aug 23 12:56:58 EDT 2025
Sat Nov 29 07:36:02 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1155-f38ba4ab7f8f2360afca604653f368e6881d0b8820f0a8c2efbae076febbc97b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/3241300024?pq-origsite=%requestingapplication%
PQID 3241300024
PQPubID 1606379
PageCount 6
ParticipantIDs proquest_journals_3241300024
crossref_primary_10_26483_ijarcs_v16i4_7305
PublicationCentury 2000
PublicationDate 2025-08-20
PublicationDateYYYYMMDD 2025-08-20
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-08-20
  day: 20
PublicationDecade 2020
PublicationPlace Udaipur
PublicationPlace_xml – name: Udaipur
PublicationTitle International journal of advanced research in computer science
PublicationYear 2025
Publisher International Journal of Advanced Research in Computer Science
Publisher_xml – name: International Journal of Advanced Research in Computer Science
SSID ssj0000399640
Score 2.3007462
Snippet : The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications....
The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications....
SourceID proquest
crossref
SourceType Aggregation Database
Index Database
StartPage 57
SubjectTerms Algorithms
Authentication
Data encryption
Encryption
Energy consumption
Hash based algorithms
Title IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
URI https://www.proquest.com/docview/3241300024
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 0976-5697
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000399640
  issn: 0976-5697
  databaseCode: P5Z
  dateStart: 20100501
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database (ProQuest)
  customDbUrl:
  eissn: 0976-5697
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000399640
  issn: 0976-5697
  databaseCode: K7-
  dateStart: 20100501
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 0976-5697
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000399640
  issn: 0976-5697
  databaseCode: BENPR
  dateStart: 20100501
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 0976-5697
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000399640
  issn: 0976-5697
  databaseCode: PIMPY
  dateStart: 20100501
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED7xGlh4I56VBzYwmMSxnQmZJiUVbYhKQZQlSpxYKkMpLfD7sdMUxMLCEkWJLFl357vPd_Z9ACfc0waXexT7lBSYcuZjnxTmIZjvMHXJM1dVZBM8jsXTk5_UCbdpfaxy7hMrR128Kpsjv3CrApANKVfjN2xZo2x1tabQWIRl2yXBUjck3vN3joWY6Msomd2VsUe53Ivhi7Gf6fnnJRvSc2Pd3u949NsdVzGmtf7f2W3AWo0ukZyZwyYslKMtWJ8zN6B6IW9D1u4mvbvHEAWyL1EYN3uDxOaq0PUAWSKOGxS0W612iKOw0-nKGMk4QEEskezc3PXa_ah7f4aMaUdh3LdXkcPAjoy6sokjeR8ZgLMDD62w34xwTbaAlQGFHtauyDOa5VwL7biMZFpljNjua9plomTCAFuSGzxONMmEckqdZyXhTJd5rnyeu7uwNHodlXuAzBAqHFUUhXlhVPuEKi5sgbfQ2jjffTidizwdz3pqpGYvUikonSkorRSUWgXtw9Fc5Gm9vqbpj7wP_v59CKuOZewl1h8cwdL75KM8hhX1-T6cThqwfB3GSa8Bi7ccNyrjMd8So4PBF4SoxUs
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQXylMUCvgAJ3DrJl7bOSBkNtkm2iRdbUPVnkLixNJy2JZuKeJP8RsZJxtQL9x64BJFihwlnm8envH4A3gjRxbj8hGnAWcN5VIENGANXpQIPGH2ZeWbjmxC5rk6OQlmG_Br6IVx2yoHm9gZ6ubMuBz5nt8VgJxL-Xj-jTrWKFddHSg0elhM258_cMm2-pCEKN-3njeJinFM16wC1GD0M6LWV3XFq1paZT1fsMqaSjB3zJj1hWqFwgiO1Rh4MssqZbzW1lWLq33b1rUJZO3je2_Bbe4r6fRqKumfnA5Dby8463tz3NYxf2_xFT9stXu1LxZ8F7VpdN3_XTf_nU-bbP1vs_EA7q-jZ6J7uD-EjXb5CLYGZgqyNlSPoUqy2fzwOCKhLjSJ8vH8dOZyceTTKXFEIwckTCaTJKJxlKaZzonOQxLmmuj04HCeFHF29J6g6sZRXrhW6yh0I-NMj2msj2IM4J7A5xv50aewuTxbts-A4BCuPNM0Dd4IbgPGjVSugN1Yi85lG94NIi7P-zNDSlxrdYAoe0CUHSBKB4ht2BlEXK7tx6r8K9_n_378Gu7GRZaWaZJPX8A9z7ETM2f7dmDz8uJ7-xLumKvLxeriVQdVAl9uGg2_AUo4H5E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=IMPROVE+DATA+ENCRYPTION+BY+USING+DIFFIE-HELLMAN+AND+DNA+ALGORITHMS%2C+AUTHENTICATED+BY+HMAC-HASH256&rft.jtitle=International+journal+of+advanced+research+in+computer+science&rft.au=Nada+Abdul+Aziz+Mustafa&rft.au=Al-Quraishi%2C+Ali+T&rft.date=2025-08-20&rft.pub=International+Journal+of+Advanced+Research+in+Computer+Science&rft.eissn=0976-5697&rft.volume=16&rft.issue=4&rft.spage=57&rft_id=info:doi/10.26483%2Fijarcs.v16i4.7305
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0976-5697&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0976-5697&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0976-5697&client=summon